SlideShare ist ein Scribd-Unternehmen logo
1 von 39
David Rook

Jedi mind tricks for building application
security programs

SecurityBSides, London
if (slide == introduction)
            System.out.println("I’m David Rook");

• Security Analyst, Realex Payments, Ireland
  CISSP, CISA, GCIH and many other acronyms



• Security Ninja (www.securityninja.co.uk)

• Speaker at international security conferences

• Nominated for multiple blog awards

• A mentor in the InfoSecMentors project

• Developed and released Agnitio
Agenda


• Using Jedi mind tricks on your developers

• s/Application Security Alien/Business Language/i;
Using Jedi mind tricks on developers


• Most developers actually want to write secure code

  • You need to take ownership of the app sec problems with them
  • Developers generally like producing quality code, use this!
  • They want security knowledge with good practices and tools
Using Jedi mind tricks on developers


Jim Bird, blog comment:

“I’m a software guy. I don’t need a meme. I need practices and tools that
work, that help me get software out the door, better software that is more
reliable and more secure.”




http://securosis.com/blog/good-programming-practices-vs.-rugged-development
Using Jedi mind tricks on developers


• How you can help developers?

  • Help them understand how to write secure code
  • Own application security problems with them
  • Don’t dictate! Speak, listen, learn and improve things
Application Security Alien


• We speak an alien language

  • We talk of injections, jackings and pwnings
Application Security Alien


• We speak an alien language

  • We talk of injections, jackings and pwnings
  • We present findings in weird formats with a side order of FUD
Application Security Alien


• I will use CVSS as an example

  • Let’s pretend we are analysing a SQL Injection vulnerability
Application Security Alien


CVSS base score equation

BaseScore = (.6*Impact +.4*Exploitability-1.5)*f(Impact)Impact =
10.41*(1-(1-ConfImpact)(1-IntegImpact)*(1-AvailImpact))Exploitability =
20*AccessComplexity*Authentication*AccessVectorf(Impact) = 0 if
Impact=0; 1.176 otherwise
Application Security Alien


CVSS Temporal Equation

TemporalScore=BaseScore*Exploitability*RemediationLevel*ReportConfi
dence
Application Security Alien


CVSS Environmental Equation

EnvironmentalScore=(AdjustedTemporal+(10-
AdjustedTemporal)*CollateralDamagePotential) *
TargetDistributionAdjustedTemporal = TemporalScore recomputed with
the Impact sub-equation replaced with the following AdjustedImpact
equation.AdjustedImpact = Min(10, 10.41*(1-(1-
ConfImpact*ConfReq)*(1-IntegImpact*IntegReq)*(1-
AvailImpact*AvailReq)))
Application Security Alien


• We speak an alien language

  • We talk of injections, jackings and pwnings
  • We present findings in weird formats with a side order of FUD
  • We feel security should just happen without having to justify it
The Business Language


• We need to speak the business language

  • We need to talk about things the business cares about
  • We need to present findings in a format that makes sense
The Business Language


• How does your business score risks?

  • Let’s pretend we are analysing a SQL Injection vulnerability
The Business Language


A simple (common!) risk equation

Probability*Impact


  Probability    Impact   Score   Appetite

      3            5       15       12
The Business Language


• We need to speak the business language

  • We need to talk about things the business cares about
  • Present findings in a format that makes sense to the business
  • Application security is no exception when it comes to resourcing
Jedi mind tricks and alien translations


• Apply the KISS principle to everything you do

  • Keep everything as simple as possible, complexity doesn’t help
  • Understand what developers want and need to write secure code
  • Work with the business and use their language and formats
QUESTIONS?
www.securityninja.co.uk


     @securityninja

     /realexninja

     /securityninja

     /realexninja
Jedi mind tricks
for building
application
security programs

Chris Wysopal
CTO & Co-founder
The formative years… Padawan?




It was all about attack.

Early web app testing: Lotus Domino, Cold Fusion
Windows Security: Netcat for Windows, L0phtCrack
Early disclosure policies: RFPolicy, L0pht Advisories
Now with professional PR team…




   Time to help the defensive side

   Led @stake research team
   @stake application security consultant
   Published Art of Software Security Testing
   Veracode CTO and Co-Founder
Why do we need executive buy in?

Application security programs will require
developer training
Application security programs will require
tools/services
Application security programs will impact
delivery schedules
Application security cannot be “voluntary”


                    Authority
Speaking the language of executives



CEOs
CFOs
CIOs
If money is the language of execs what do they
say?

How do I grow my top line?
How do I lower costs?
How do I mitigate risk?
Talk in terms of business risk and
use monetary terms when
possible.
Then we can we can speak the
same language.
Different types of risk

Legal risk – Legal costs, settlement
costs, fines
Compliance risk – fines, lost business
Brand risk – lost business
Security risk - ????
Translate technical risk to monetary risk

 What is the monetary risk from vulnerabilities in your application
 portfolio?

 Monetary risk is your expected loss; derived from your
 vulnerabilities, your breach cost, threat space data




                        Your            Threat
     Your              Breach           Space
 Vulnerabilities        Cost            Data



                                   32
Your Breach Cost

       Use cost analysis from your earlier breaches
       Use breach cost from public sources
           – Example: April 2010 Ponemon Institute Report

(US Dollars)
                          Detection &                 Notification              Ex-Post               Lost                  Total
                          Escalation                                            Response              Business
Average                   264,208                     500,321                   1,514,819             4,472,030             6,751,451

Per-capita                8                           15                        46                    135                   204

Ponemon average and per-capita US breach cost (US Dollars)

 Comm       Consu   Educat    Energ   Financi   Health     Hotel    Manu       Media   Pharma   Researc     Retail   Serv    Tech     Transp
 unicati    mer     ion       y       al        care       &        facturin                    h                    ices    nology   ortatio
 on                                                        Leisur   g                                                                 n
                                                           e

 209        159     203       237               294        153      136        149     310      266         133      256     192      121
                                      248


Ponemon per-capita data by US industry sector (US Dollars)
                                                                                                                                      33
Threat Space Data

   Error           Attack Type                                     Hacking Root Cause (Vulnerability
Physical                                                                      Category)
 Misuse                                                        Remote File Inclusion
  Social
                                                           Insufficient Authentication
Hacking
                                                                 Command Injection
Malware
                                                           Backdoor/Control Channel
           0%      20%           40%             60%                                     0%   10%   20%   30%   40%


40% of data breaches are due to hacking                   Top 7 application vulnerability categories
                             Source: Verizon 2010 Data Breach Investigations Report



                62% of organizations experienced breaches in
                critical applications in 12 month period
                    Source: Forrester 2009 Application Risk Management and Business Survey



     34
How to Derive Your Expected Loss



expected loss vulnerability category =   f
                                             (
                                                         % of orgs breached X
                                                              breach cost X
                                                 breach likelihood from vuln. category        )
     Baseline expected loss for your organization due to SQL Injection*



                                                  (                          )
                                                          62% X
           expected loss Sql injection =     f        $248 X 100,00 X
                                                           25%

          *If your SQL Injection prevalence is similar to average SQL Injection prevalence,
          assumes 100,000 records




35
Monetary Risk Derived From Relative Prevalence

  Vulnerability    Breach      Baseline        Average % of         Your % of          Your Monetary
  Category         Likelihoo   Expected        Apps Affected1       Apps               Risk
                   d           loss                                 Affected2
  Backdoor/              29%    $4,459,040                   8%                15%     higher
  Control
  Channel
  SQL Injections         25%     3,844,000                  24%                10%     lower

  Command                14%     2,152,640                   7%                 6%     same
  Injection
  XSS                     9%     1,383,840                  34%                 5%     lower

  Insufficient            7%     1,076,320                   5%                 2%     lower
  Authentication
  Insufficient            7%     1,076,320                   7%                 7%     same
  Authorization
  Remote File             2%       307,520                  <1%                <1%     same
  Inclusion

                        Assume 100,000 customer records.
                        For SQLi the expected loss is:
 36                     62% * $248 * 100,000 * 25% = $3,844,000
                                      1.   Veracode 2010 State of Software Security Report, Vol. 2
                                      2.   De-identified financial service company data from Veracode industry data
Executives want…

An organizational wide view. Am I lowering overall
application risk?
 –   Internal code
 –   Outsourced
 –   Vendor supplied
 –   Open source
A program that has achievable objectives. What am I
getting for the money I am spending?
A program that is measurable: metrics and reporting.
Am I marching toward the objectives?
 – Which dev teams, outsourcers are performing well?
 – How is my organization doing relative to my peers?
Tips to make the program successful

 The right people have to understand what is
 going to happen before you start
 Do a real world pen test or assessment of a
 project. Demonstrate relevant risk.
 Integrate into existing processes
    SDLC
    Procurement/legal
    M&A
Q&A
          Speaker Contact
            Information:
           Chris Wysopal
      (cwysopal@veracode.com)
         Twitter: @WeldPond


              David Rook
           www.securityninja.co.uk

                @securityninja

                 /realexninja

                 /securityninja

39
                 /realexninja

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET Journal
 
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revShanker Sareen
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Editor IJARCET
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014Ricardo Resnik
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...Andris Soroka
 
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malwareDigital Pymes
 
ISACA Dallas Texas 2010 - Ulf Mattsson
ISACA Dallas Texas 2010 - Ulf MattssonISACA Dallas Texas 2010 - Ulf Mattsson
ISACA Dallas Texas 2010 - Ulf MattssonUlf Mattsson
 
Web Application Security: Connecting the Dots
Web Application Security: Connecting the DotsWeb Application Security: Connecting the Dots
Web Application Security: Connecting the DotsInnoTech
 
ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012Ulf Mattsson
 
Designing your applications with a security twist 2007
Designing your applications with a security twist 2007Designing your applications with a security twist 2007
Designing your applications with a security twist 2007Blue Slate Solutions
 
Attackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumAttackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumRadware
 
How to Audit
How to AuditHow to Audit
How to Auditayousif
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent ThreatFireEye, Inc.
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniquesijdpsjournal
 

Was ist angesagt? (18)

IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
 
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_rev
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
 
DamballaOverview
DamballaOverviewDamballaOverview
DamballaOverview
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware
 
Ipremier case
Ipremier caseIpremier case
Ipremier case
 
ISACA Dallas Texas 2010 - Ulf Mattsson
ISACA Dallas Texas 2010 - Ulf MattssonISACA Dallas Texas 2010 - Ulf Mattsson
ISACA Dallas Texas 2010 - Ulf Mattsson
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
 
Web Application Security: Connecting the Dots
Web Application Security: Connecting the DotsWeb Application Security: Connecting the Dots
Web Application Security: Connecting the Dots
 
ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012
 
Designing your applications with a security twist 2007
Designing your applications with a security twist 2007Designing your applications with a security twist 2007
Designing your applications with a security twist 2007
 
Attackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumAttackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the Equilibrium
 
How to Audit
How to AuditHow to Audit
How to Audit
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 

Andere mochten auch

Your money, your media a DRMtastic (reverse|re) eng. tutorial
Your money, your media a DRMtastic (reverse|re) eng. tutorialYour money, your media a DRMtastic (reverse|re) eng. tutorial
Your money, your media a DRMtastic (reverse|re) eng. tutorialSecurity BSides London
 
Agnitio: its static analysis, but not as we know it
Agnitio: its static analysis, but not as we know itAgnitio: its static analysis, but not as we know it
Agnitio: its static analysis, but not as we know itSecurity BSides London
 
1A Lundberg Sellberg Citizen Services - Sweden EHiN 2014
1A Lundberg Sellberg Citizen Services - Sweden EHiN 20141A Lundberg Sellberg Citizen Services - Sweden EHiN 2014
1A Lundberg Sellberg Citizen Services - Sweden EHiN 2014IKT-Norge
 
Kule Dergisi // 29. Sayı
Kule Dergisi // 29. SayıKule Dergisi // 29. Sayı
Kule Dergisi // 29. SayıKoç University
 
IT and Sustainability: New Strategies for Reducing Carbon Emissions and Reso...
IT and Sustainability: New Strategies for Reducing  Carbon Emissions and Reso...IT and Sustainability: New Strategies for Reducing  Carbon Emissions and Reso...
IT and Sustainability: New Strategies for Reducing Carbon Emissions and Reso...Jeffrey Funk
 
NSHOF presentation 2012
NSHOF presentation 2012NSHOF presentation 2012
NSHOF presentation 2012nshof
 
Gamma Piu' - Catalog produse 2015 - 2016
Gamma Piu' - Catalog produse  2015 - 2016Gamma Piu' - Catalog produse  2015 - 2016
Gamma Piu' - Catalog produse 2015 - 2016Claudio Nicodemo
 
Jobs tobe startangebot für unternehmen
Jobs tobe startangebot für unternehmenJobs tobe startangebot für unternehmen
Jobs tobe startangebot für unternehmenAndreas Vill
 
Nordea csr 2011_eng_120216
Nordea csr 2011_eng_120216Nordea csr 2011_eng_120216
Nordea csr 2011_eng_120216Nordea Bank
 
Tradekey HR By SalmanHanzala complete project and report
Tradekey HR By SalmanHanzala complete project and report Tradekey HR By SalmanHanzala complete project and report
Tradekey HR By SalmanHanzala complete project and report Salman Hanzala
 
NIC 2013 Annual Report: It's All About Access -- Anatomy of Modern Government
NIC 2013 Annual Report: It's All About Access -- Anatomy of Modern GovernmentNIC 2013 Annual Report: It's All About Access -- Anatomy of Modern Government
NIC 2013 Annual Report: It's All About Access -- Anatomy of Modern GovernmentNIC Inc | EGOV
 
Touchmark at Mt. Bachelor Village - June 2014 Newsletter
Touchmark at Mt. Bachelor Village - June 2014 NewsletterTouchmark at Mt. Bachelor Village - June 2014 Newsletter
Touchmark at Mt. Bachelor Village - June 2014 NewsletterTouchmark
 
Win more listings like a boss. Less Blah Blah More Ah Ha success strategies...
Win more listings like a boss.  Less Blah Blah More Ah Ha  success strategies...Win more listings like a boss.  Less Blah Blah More Ah Ha  success strategies...
Win more listings like a boss. Less Blah Blah More Ah Ha success strategies...Ken Brand
 
(Efc 4) european federation of corrosion guidelines on electrochemical corros...
(Efc 4) european federation of corrosion guidelines on electrochemical corros...(Efc 4) european federation of corrosion guidelines on electrochemical corros...
(Efc 4) european federation of corrosion guidelines on electrochemical corros...Muhammad Awais
 

Andere mochten auch (20)

Cloud computing due diligence WTF?
Cloud computing due diligence WTF?Cloud computing due diligence WTF?
Cloud computing due diligence WTF?
 
Penetration testing must die
Penetration testing must diePenetration testing must die
Penetration testing must die
 
All your logs are belong to you!
All your logs are belong to you!All your logs are belong to you!
All your logs are belong to you!
 
Breaking out of restricted RDP
Breaking out of restricted RDPBreaking out of restricted RDP
Breaking out of restricted RDP
 
Your money, your media a DRMtastic (reverse|re) eng. tutorial
Your money, your media a DRMtastic (reverse|re) eng. tutorialYour money, your media a DRMtastic (reverse|re) eng. tutorial
Your money, your media a DRMtastic (reverse|re) eng. tutorial
 
Agnitio: its static analysis, but not as we know it
Agnitio: its static analysis, but not as we know itAgnitio: its static analysis, but not as we know it
Agnitio: its static analysis, but not as we know it
 
1A Lundberg Sellberg Citizen Services - Sweden EHiN 2014
1A Lundberg Sellberg Citizen Services - Sweden EHiN 20141A Lundberg Sellberg Citizen Services - Sweden EHiN 2014
1A Lundberg Sellberg Citizen Services - Sweden EHiN 2014
 
Kule Dergisi // 29. Sayı
Kule Dergisi // 29. SayıKule Dergisi // 29. Sayı
Kule Dergisi // 29. Sayı
 
Top 15 accounting
Top 15 accountingTop 15 accounting
Top 15 accounting
 
IT and Sustainability: New Strategies for Reducing Carbon Emissions and Reso...
IT and Sustainability: New Strategies for Reducing  Carbon Emissions and Reso...IT and Sustainability: New Strategies for Reducing  Carbon Emissions and Reso...
IT and Sustainability: New Strategies for Reducing Carbon Emissions and Reso...
 
2015 Lift & Move USA: Highlights of a Career in Heavy Haul
2015 Lift & Move USA: Highlights of a Career in Heavy Haul2015 Lift & Move USA: Highlights of a Career in Heavy Haul
2015 Lift & Move USA: Highlights of a Career in Heavy Haul
 
NSHOF presentation 2012
NSHOF presentation 2012NSHOF presentation 2012
NSHOF presentation 2012
 
Gamma Piu' - Catalog produse 2015 - 2016
Gamma Piu' - Catalog produse  2015 - 2016Gamma Piu' - Catalog produse  2015 - 2016
Gamma Piu' - Catalog produse 2015 - 2016
 
Jobs tobe startangebot für unternehmen
Jobs tobe startangebot für unternehmenJobs tobe startangebot für unternehmen
Jobs tobe startangebot für unternehmen
 
Nordea csr 2011_eng_120216
Nordea csr 2011_eng_120216Nordea csr 2011_eng_120216
Nordea csr 2011_eng_120216
 
Tradekey HR By SalmanHanzala complete project and report
Tradekey HR By SalmanHanzala complete project and report Tradekey HR By SalmanHanzala complete project and report
Tradekey HR By SalmanHanzala complete project and report
 
NIC 2013 Annual Report: It's All About Access -- Anatomy of Modern Government
NIC 2013 Annual Report: It's All About Access -- Anatomy of Modern GovernmentNIC 2013 Annual Report: It's All About Access -- Anatomy of Modern Government
NIC 2013 Annual Report: It's All About Access -- Anatomy of Modern Government
 
Touchmark at Mt. Bachelor Village - June 2014 Newsletter
Touchmark at Mt. Bachelor Village - June 2014 NewsletterTouchmark at Mt. Bachelor Village - June 2014 Newsletter
Touchmark at Mt. Bachelor Village - June 2014 Newsletter
 
Win more listings like a boss. Less Blah Blah More Ah Ha success strategies...
Win more listings like a boss.  Less Blah Blah More Ah Ha  success strategies...Win more listings like a boss.  Less Blah Blah More Ah Ha  success strategies...
Win more listings like a boss. Less Blah Blah More Ah Ha success strategies...
 
(Efc 4) european federation of corrosion guidelines on electrochemical corros...
(Efc 4) european federation of corrosion guidelines on electrochemical corros...(Efc 4) european federation of corrosion guidelines on electrochemical corros...
(Efc 4) european federation of corrosion guidelines on electrochemical corros...
 

Ähnlich wie Jedi mind tricks for building application security programs

Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software securityMarco Morana
 
Owasp Ireland - The State of Software Security
Owasp  Ireland - The State of Software SecurityOwasp  Ireland - The State of Software Security
Owasp Ireland - The State of Software SecurityTyler Shields
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepIvanti
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secureEoin Keary
 
The Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceThe Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceTieu Luu
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014Peggy Lawless
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserSource Conference
 
Application Security TRENDS – Lessons Learnt- Firosh Ummer
Application Security TRENDS – Lessons Learnt- Firosh UmmerApplication Security TRENDS – Lessons Learnt- Firosh Ummer
Application Security TRENDS – Lessons Learnt- Firosh UmmerOWASP-Qatar Chapter
 
Cyber Security for Critical Infrastructure
Cyber Security for Critical InfrastructureCyber Security for Critical Infrastructure
Cyber Security for Critical InfrastructureMohit Rampal
 
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...Lumension
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
What? Why? Who? How? Of Application Security Testing
What? Why? Who? How? Of Application Security Testing What? Why? Who? How? Of Application Security Testing
What? Why? Who? How? Of Application Security Testing TEST Huddle
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesSplunk
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurityVincent Kwon
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the CloudAlert Logic
 

Ähnlich wie Jedi mind tricks for building application security programs (20)

Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software security
 
Owasp Ireland - The State of Software Security
Owasp  Ireland - The State of Software SecurityOwasp  Ireland - The State of Software Security
Owasp Ireland - The State of Software Security
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeep
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secure
 
The Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceThe Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber Intelligence
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Application Security TRENDS – Lessons Learnt- Firosh Ummer
Application Security TRENDS – Lessons Learnt- Firosh UmmerApplication Security TRENDS – Lessons Learnt- Firosh Ummer
Application Security TRENDS – Lessons Learnt- Firosh Ummer
 
Cyber Security for Critical Infrastructure
Cyber Security for Critical InfrastructureCyber Security for Critical Infrastructure
Cyber Security for Critical Infrastructure
 
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
What? Why? Who? How? Of Application Security Testing
What? Why? Who? How? Of Application Security Testing What? Why? Who? How? Of Application Security Testing
What? Why? Who? How? Of Application Security Testing
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurity
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 

Mehr von Security BSides London

You built a security castle and forgot the bridge…now users are climbing your...
You built a security castle and forgot the bridge…now users are climbing your...You built a security castle and forgot the bridge…now users are climbing your...
You built a security castle and forgot the bridge…now users are climbing your...Security BSides London
 
The Funny Thing About Information Security
The Funny Thing About Information SecurityThe Funny Thing About Information Security
The Funny Thing About Information SecuritySecurity BSides London
 
Practical Crypto Attacks Against Web Applications
Practical Crypto Attacks Against Web Applications Practical Crypto Attacks Against Web Applications
Practical Crypto Attacks Against Web Applications Security BSides London
 

Mehr von Security BSides London (6)

Security YMCA
Security YMCASecurity YMCA
Security YMCA
 
You built a security castle and forgot the bridge…now users are climbing your...
You built a security castle and forgot the bridge…now users are climbing your...You built a security castle and forgot the bridge…now users are climbing your...
You built a security castle and forgot the bridge…now users are climbing your...
 
The Funny Thing About Information Security
The Funny Thing About Information SecurityThe Funny Thing About Information Security
The Funny Thing About Information Security
 
Breaking, Entering and Pentesting
Breaking, Entering and Pentesting Breaking, Entering and Pentesting
Breaking, Entering and Pentesting
 
Practical Crypto Attacks Against Web Applications
Practical Crypto Attacks Against Web Applications Practical Crypto Attacks Against Web Applications
Practical Crypto Attacks Against Web Applications
 
Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
 

Kürzlich hochgeladen

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Jedi mind tricks for building application security programs

  • 1. David Rook Jedi mind tricks for building application security programs SecurityBSides, London
  • 2. if (slide == introduction) System.out.println("I’m David Rook"); • Security Analyst, Realex Payments, Ireland CISSP, CISA, GCIH and many other acronyms • Security Ninja (www.securityninja.co.uk) • Speaker at international security conferences • Nominated for multiple blog awards • A mentor in the InfoSecMentors project • Developed and released Agnitio
  • 3. Agenda • Using Jedi mind tricks on your developers • s/Application Security Alien/Business Language/i;
  • 4. Using Jedi mind tricks on developers • Most developers actually want to write secure code • You need to take ownership of the app sec problems with them • Developers generally like producing quality code, use this! • They want security knowledge with good practices and tools
  • 5. Using Jedi mind tricks on developers Jim Bird, blog comment: “I’m a software guy. I don’t need a meme. I need practices and tools that work, that help me get software out the door, better software that is more reliable and more secure.” http://securosis.com/blog/good-programming-practices-vs.-rugged-development
  • 6. Using Jedi mind tricks on developers • How you can help developers? • Help them understand how to write secure code • Own application security problems with them • Don’t dictate! Speak, listen, learn and improve things
  • 7. Application Security Alien • We speak an alien language • We talk of injections, jackings and pwnings
  • 8.
  • 9.
  • 10.
  • 11. Application Security Alien • We speak an alien language • We talk of injections, jackings and pwnings • We present findings in weird formats with a side order of FUD
  • 12. Application Security Alien • I will use CVSS as an example • Let’s pretend we are analysing a SQL Injection vulnerability
  • 13.
  • 14. Application Security Alien CVSS base score equation BaseScore = (.6*Impact +.4*Exploitability-1.5)*f(Impact)Impact = 10.41*(1-(1-ConfImpact)(1-IntegImpact)*(1-AvailImpact))Exploitability = 20*AccessComplexity*Authentication*AccessVectorf(Impact) = 0 if Impact=0; 1.176 otherwise
  • 15. Application Security Alien CVSS Temporal Equation TemporalScore=BaseScore*Exploitability*RemediationLevel*ReportConfi dence
  • 16. Application Security Alien CVSS Environmental Equation EnvironmentalScore=(AdjustedTemporal+(10- AdjustedTemporal)*CollateralDamagePotential) * TargetDistributionAdjustedTemporal = TemporalScore recomputed with the Impact sub-equation replaced with the following AdjustedImpact equation.AdjustedImpact = Min(10, 10.41*(1-(1- ConfImpact*ConfReq)*(1-IntegImpact*IntegReq)*(1- AvailImpact*AvailReq)))
  • 17.
  • 18. Application Security Alien • We speak an alien language • We talk of injections, jackings and pwnings • We present findings in weird formats with a side order of FUD • We feel security should just happen without having to justify it
  • 19. The Business Language • We need to speak the business language • We need to talk about things the business cares about • We need to present findings in a format that makes sense
  • 20. The Business Language • How does your business score risks? • Let’s pretend we are analysing a SQL Injection vulnerability
  • 21. The Business Language A simple (common!) risk equation Probability*Impact Probability Impact Score Appetite 3 5 15 12
  • 22. The Business Language • We need to speak the business language • We need to talk about things the business cares about • Present findings in a format that makes sense to the business • Application security is no exception when it comes to resourcing
  • 23. Jedi mind tricks and alien translations • Apply the KISS principle to everything you do • Keep everything as simple as possible, complexity doesn’t help • Understand what developers want and need to write secure code • Work with the business and use their language and formats
  • 24. QUESTIONS? www.securityninja.co.uk @securityninja /realexninja /securityninja /realexninja
  • 25. Jedi mind tricks for building application security programs Chris Wysopal CTO & Co-founder
  • 26. The formative years… Padawan? It was all about attack. Early web app testing: Lotus Domino, Cold Fusion Windows Security: Netcat for Windows, L0phtCrack Early disclosure policies: RFPolicy, L0pht Advisories
  • 27. Now with professional PR team… Time to help the defensive side Led @stake research team @stake application security consultant Published Art of Software Security Testing Veracode CTO and Co-Founder
  • 28. Why do we need executive buy in? Application security programs will require developer training Application security programs will require tools/services Application security programs will impact delivery schedules Application security cannot be “voluntary” Authority
  • 29. Speaking the language of executives CEOs CFOs CIOs
  • 30. If money is the language of execs what do they say? How do I grow my top line? How do I lower costs? How do I mitigate risk? Talk in terms of business risk and use monetary terms when possible. Then we can we can speak the same language.
  • 31. Different types of risk Legal risk – Legal costs, settlement costs, fines Compliance risk – fines, lost business Brand risk – lost business Security risk - ????
  • 32. Translate technical risk to monetary risk What is the monetary risk from vulnerabilities in your application portfolio? Monetary risk is your expected loss; derived from your vulnerabilities, your breach cost, threat space data Your Threat Your Breach Space Vulnerabilities Cost Data 32
  • 33. Your Breach Cost Use cost analysis from your earlier breaches Use breach cost from public sources – Example: April 2010 Ponemon Institute Report (US Dollars) Detection & Notification Ex-Post Lost Total Escalation Response Business Average 264,208 500,321 1,514,819 4,472,030 6,751,451 Per-capita 8 15 46 135 204 Ponemon average and per-capita US breach cost (US Dollars) Comm Consu Educat Energ Financi Health Hotel Manu Media Pharma Researc Retail Serv Tech Transp unicati mer ion y al care & facturin h ices nology ortatio on Leisur g n e 209 159 203 237 294 153 136 149 310 266 133 256 192 121 248 Ponemon per-capita data by US industry sector (US Dollars) 33
  • 34. Threat Space Data Error Attack Type Hacking Root Cause (Vulnerability Physical Category) Misuse Remote File Inclusion Social Insufficient Authentication Hacking Command Injection Malware Backdoor/Control Channel 0% 20% 40% 60% 0% 10% 20% 30% 40% 40% of data breaches are due to hacking Top 7 application vulnerability categories Source: Verizon 2010 Data Breach Investigations Report 62% of organizations experienced breaches in critical applications in 12 month period Source: Forrester 2009 Application Risk Management and Business Survey 34
  • 35. How to Derive Your Expected Loss expected loss vulnerability category = f ( % of orgs breached X breach cost X breach likelihood from vuln. category ) Baseline expected loss for your organization due to SQL Injection* ( ) 62% X expected loss Sql injection = f $248 X 100,00 X 25% *If your SQL Injection prevalence is similar to average SQL Injection prevalence, assumes 100,000 records 35
  • 36. Monetary Risk Derived From Relative Prevalence Vulnerability Breach Baseline Average % of Your % of Your Monetary Category Likelihoo Expected Apps Affected1 Apps Risk d loss Affected2 Backdoor/ 29% $4,459,040 8% 15% higher Control Channel SQL Injections 25% 3,844,000 24% 10% lower Command 14% 2,152,640 7% 6% same Injection XSS 9% 1,383,840 34% 5% lower Insufficient 7% 1,076,320 5% 2% lower Authentication Insufficient 7% 1,076,320 7% 7% same Authorization Remote File 2% 307,520 <1% <1% same Inclusion Assume 100,000 customer records. For SQLi the expected loss is: 36 62% * $248 * 100,000 * 25% = $3,844,000 1. Veracode 2010 State of Software Security Report, Vol. 2 2. De-identified financial service company data from Veracode industry data
  • 37. Executives want… An organizational wide view. Am I lowering overall application risk? – Internal code – Outsourced – Vendor supplied – Open source A program that has achievable objectives. What am I getting for the money I am spending? A program that is measurable: metrics and reporting. Am I marching toward the objectives? – Which dev teams, outsourcers are performing well? – How is my organization doing relative to my peers?
  • 38. Tips to make the program successful The right people have to understand what is going to happen before you start Do a real world pen test or assessment of a project. Demonstrate relevant risk. Integrate into existing processes SDLC Procurement/legal M&A
  • 39. Q&A Speaker Contact Information: Chris Wysopal (cwysopal@veracode.com) Twitter: @WeldPond David Rook www.securityninja.co.uk @securityninja /realexninja /securityninja 39 /realexninja